On Dec 12, 2006, at 2:06 AM, Hector Santos wrote:

The fact of the matter is you are directly competing and blowing against the wind with the every growing MTA trend of REDUCING unsolicited abusive mail and spam BEFORE it gets to the user. Whether you like it or not, its a reality both technically and every more growing in the legal world. Its happening. So get use to it.

DKIM might be used for white-listing (assuming the SMTP client can be associated with the signing-domain). White-listing does not get rid of abusive mail, it trades off other measures that might be more costly in terms of integrity or overhead.

DKIM however can never reduce the level of abuse through the application of a restrictive policy. DKIM can reduce the level of abuse by making spoofing unsuccessful. There are millions of new domains created every day at no cost to the bad actor. Neither SPF or DKIM identify new sources based upon some restrictive policy. A restrictive policy adds little, if any anti-spoofing protection when the recipient must still visual recognize the originator based upon what they see. Authentication and recognition is where progress is made, often by intelligent filtering at this point that is not based upon a policy record. DKIM in conjunction with a recognition scheme provides reasonable protections without any policy record being used. The policy record requirements should instead focus on ensuring a larger portion of email can be recognized without complex three-party administration, as now envisioned. Focus upon enabling a greater use of DKIM+Recognition+Annotation.

So either DKIM-BASE is going to be part of the solution or its not, at the very least, my INPUT says that SSP will give it a fighting chance and in all honestly, will help people, as yourself, in your market who have a direct interest in seeing users' make the final decision of all messages.

With a recognition scheme that adds annotation on messages found in their address-book or on a DAC compatible list, this will help people by providing the desired protections. A restrictive scheme takes away freedoms without little protective benefit, but at a loss of email integrity.

-Doug


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to